Remote Support Software Test by C’T (English Translation)

Total Page:16

File Type:pdf, Size:1020Kb

Remote Support Software Test by C’T (English Translation) Remote Support Software Test by c’t (English translation) Remote control software ISL Light Rating Vista assistance (UAC) Connection adjustment (Colours, Desktop background, Aero off, Region and application sharing) Reporting and session recording Setup and installation very good good satisfactory poor very poor Remote support software test I c't Magazin, Issue 21 - 2008 Test I Remote support software Reiko Kaps take control of client’s mouse or keyboard. Remote Desktop (RDP) tool built-in the Microsoft Windows or VNC (Virtual Network Computing) make resolving such situations Support providers easier. Desktop content of the remote com- puter is transferred through the network to Fast remote support for Vista desktop supporter’s monitor, who can in addition control the remote computer’s mouse and There is no need for driving to your parents, friends or customers when keyboard, or transfer files and short messag- they need help with their computers. Remote assistance applications es between supporter and user. that pass through remote firewalls and routers enable you to establish a connection with the remote computer over the Internet. We tested several Obstacles remote desktop support products in this c’t test. When a user starts a Windows Remote Desk- top software, her or his computer starts op- ystem administrators and helpdesk op- Normally, there are few instances where erating as a server, which offers its desktop erators in most cases remotely admin- advice on the phone can help solving solve over the network. When supporter wants Sister computers of their clients. Remote the biggest of problems, as the supporter to control this desktop, the network router maintenance software and private networks must explain every click of a mouse, ask for must forward the supporter’s request to make travelling to a customer unnecessary. the result of every action, and finally trust the client, which then forwards the Remote An ordinary computer whiz does not always the client to provide correct descriptions of Desktop port into local client network, of the have such refined infrastructure available, what is going on. Problems could surely be computer that is to be administered. The c’t when relatives or friends need help with Win- solved faster if supporter was actually able magazine’s remote maintenance tool [1, 2, 3] dows Vista, Word or printer. to see the remote Windows desktop or even reverses this procedure: VNC server on theI 136 c’t 2008, issue 19 © Copyright by Heise Zeitschriften Verlag GmbH & Co. KG. Publication and reproduction only by exclusive authorization of the publishing house Heise Zeitschriften Verlag. Test I Remote support software Remote support software user side connects user invites the supporter. When the invita- or limit remote desktop to only specific parts to supporter’s computer. It is only the user tion is accepted an actual help session starts of the desktop or even individual application who has to engage port forwarding on the over a link on the web page. windows. Some even disable Vista’s 3D-look router, which sends data from the VNC server Other programs, such as Netviewer, during the session. Animation and transpar- to the VNC client (in this case supporter). fastviewer and TeamViewer do not have a ent windows cause additional traffic that Routers or firewalls cannot be set up web interface and authenticate towards the should be avoided especially with slow con- for port forwarding if supporter uses a mo- proxy server with a key, which is in fastviewer nections. bile connection or WLAN-hotspot. In cases, and Netviewer cases combined with the li- Even though the task is identical, the us- when supporter’s and user’s computers are cense: supporter and user need harmonized age concepts of test candidates differ sub- placed in local networks, they both use NAT software in order to make use of remote as- stantially. NTRconnect or Netviewer are more (Network Address Translation) to access web. sistance. Other freeware solutions, such as likely to be used for managing own comput- Therefore, such computers cannot directly TeamViewer and CrossLoop only need a one- ers or entire network. Others, such as Instant connect to each other. In these cases remote time password to establish a connection. Housecall or CrossLoop connect supporters assistance connections fail at the network with users, who need help with software or router. Criteria hardware installation. WebEx or pcvisit 8 or- ganize virtual meetings among users. All tested programs had to prove their abil- Web ambulance We tested the candidates’ procedures, ity to control user’s Vista desktop, which is including how supporter and user establish Remote support products which we tested accessing the Internet from a local network. a connection, using well tested remote con- are designed to perform the same tasks Supporter’s computer was also inside a lo- trol applications. Many programs prefer web as Windows Remote Desktop or VNC. The cal area network (LAN) behind a router that based setup, while others consist of separate remote desktop support products create a blocks unwanted data packages from the pieces of software for supporters and users. connection between supporter and user, but Internet. Only a few run without installation. Most pro- not directly between the two computers. Vista introduced User Account Control grams can be upgraded in license, which is Since both supporter and user have no (UAC), which controls startup of programs subject to additional costs. problems accessing the Internet, our test on the second desktop in the background. candidates forward the session through an When some software requires administrator additional commonly accessible computer. permissions, UAC covers user’s desktop with This in-between computer (proxy) creates a dialogue which requires the user’s permis- a session, which can be accessed by both sion. Some candidate programs leave UAC What we missed supporter and user and logged into by us- management to the local user or even cannot On closer examination, some of the earlier ing passwords or certificates. Proxy then in- work with UAC (e.g. CSpace). Others install a test candidates no longer met our criteria terposes between both sides and connects service or require administrator permissions or even completely failed our connection them by a data tunnel, enabling the support- to allow the supporter to confirm UAC dia- er to work on user’s desktop. logs and then control started programs (e.g. tests. Programs like Remotesupportsys- Many professional supporters miss ad- fastviewer). tem, Radmin and MSN Live Messenger fail ditional functionalities in freeware remote Remote desktop software VNC transfers when connections are made from a local maintenance programs such as actions log passwords, mouse movements and key- network to a local network and port for- or video recording of the session. This could strokes in a non-encrypted form. People who warding is therefore needed on network allow the supporter to prove his or her ac- use VNC therefore transfer data over SSH or router. tions in case of disputes. Many remote sup- virtual private network (VPN). Products we port programs enable file transfer, which is tested encrypt the data upon transfer using Netop On Demand froze right after the usually completely sufficient for small tasks. SSL or some other encrypting protocol. Users However, if entire hard disk or folders need program started because it could not identify towards the tested programs with find the MSVCR71.DLL library. Installation to be protected, a file manager or backup certificates or via HTTPS based login. program is a better choice. People who reg- program obviously did not install the file, Communication between supporter and ularly administer more than one computer which is also not a part of the standard user in most tested cases takes place over will appreciate computer management, as it Vista operating system setup. We ad- an in-between server, what in principle al- collects customer information, session pro- lows the server to record all transferred data. dressed a question to the Danish Netop- tocols and other data. Most of the test candidates are commercial Support, but are still waiting for their re- therefore there is no source code available spnse. Similarly,we were unable to create First aid so we have to trust the manufacturers that remote access session using Laplink Ev- 18 remote support programs had to prove encryption and overall security of the pro- erywhere, and are yet to receive suitable themselves in our test. They had to establish grams is handled properly. Only CSpace and support from them. a remote desktop connection between sup- Fog Creek Copilot allow an inspection of anti- porter and user, with both of them accessing theft protection in their code. In addition, just before the editorial dead- the Internet from a local network. Connec- Remote control software transfers graph- line, TeamViewer introduced a host mod- tion should be established without setting ical user interfaces of desktops. This means ule for their remote assistance software, up any port forwarding on router. that the amount of data to be transferred which enables administration of comput- Programs such as LogMeIn and Instant depends on number of colours shown on the ers that currently have no users logged Housecall are similar to a web service, which display and refresh rate. High values of these provide desktop over a browser or separate settings can quickly overburden slow con- on. Unfortunately, Citrix’s GoToMyPC has software. Supporters must log on to the web nections over analogue modem or mobile not been tested yet, therefore we will test page beforehand. Some candidates require access. Some test candidates offer extra op- this program, the TeamViewer Host and the supporter to be the one who invites the tions for such cases: automatically or by us- candidates Netop Ondemand and Laplink other side to the session over e-mail, Instant ing controls they reduce number of colours Everywhere in the next article.
Recommended publications
  • THINC: a Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices
    THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2011 c 2011 Ricardo A. Baratto This work may be used in accordance with Creative Commons, Attribution-NonCommercial-NoDerivs License. For more information about that license, see http://creativecommons.org/licenses/by-nc-nd/3.0/. For other uses, please contact the author. ABSTRACT THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices Ricardo A. Baratto THINC is a new virtual and remote display architecture for desktop computing. It has been designed to address the limitations and performance shortcomings of existing remote display technology, and to provide a building block around which novel desktop architectures can be built. THINC is architected around the notion of a virtual display device driver, a software-only component that behaves like a traditional device driver, but instead of managing specific hardware, enables desktop input and output to be intercepted, manipulated, and redirected at will. On top of this architecture, THINC introduces a simple, low-level, device-independent representation of display changes, and a number of novel optimizations and techniques to perform efficient interception and redirection of display output. This dissertation presents the design and implementation of THINC. It also intro- duces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services. The contributions of this dissertation are as follows: • A high performance remote display system for LAN and WAN environments.
    [Show full text]
  • The Application Usage and Risk Report an Analysis of End User Application Trends in the Enterprise
    The Application Usage and Risk Report An Analysis of End User Application Trends in the Enterprise 8th Edition, December 2011 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 94089 www.paloaltonetworks.com Table of Contents Executive Summary ........................................................................................................ 3 Demographics ............................................................................................................................................. 4 Social Networking Use Becomes More Active ................................................................ 5 Facebook Applications Bandwidth Consumption Triples .......................................................................... 5 Twitter Bandwidth Consumption Increases 7-Fold ................................................................................... 6 Some Perspective On Bandwidth Consumption .................................................................................... 7 Managing the Risks .................................................................................................................................... 7 Browser-based Filesharing: Work vs. Entertainment .................................................... 8 Infrastructure- or Productivity-Oriented Browser-based Filesharing ..................................................... 9 Entertainment Oriented Browser-based Filesharing .............................................................................. 10 Comparing Frequency and Volume of Use
    [Show full text]
  • Protocol Filter Planning Worksheet, V7.X
    Protocol Filter Planning Worksheet Websense Web Security Solutions (v7.x) Protocol filter (name): Applies to (clients): In policy (name): At (time and days): Legend Action Bandwidth Permit Block Network Protocol (percentage) Protocol Name Action Log Bandwidth Database SQL Net P B N P % File Transfer FTP P B N P % Gopher P B N P % WAIS P B N P % YouSendIt P B N P % Instant Messaging / Chat AOL Instant Messenger or ICQ P B N P % Baidu Hi P B N P % Brosix P B N P % Camfrog P B N P % Chikka Messenger P B N P % Eyeball Chat P B N P % 1 © 2013 Websense, Inc. Protocol filter name: Protocol Name Action Log Bandwidth Gadu-Gadu P B N P % Gizmo Project P B N P % Globe 7 P B N P % Gmail Chat (WSG Only) P B N P % Goober Messenger P B N P % Gooble Talk P B N P % IMVU P B N P % IRC P B N P % iSpQ P B N P % Mail.Ru P B N P % Meetro P B N P % MSC Messenger P B N P % MSN Messenger P B N P % MySpaceIM P B N P % NateOn P B N P % Neos P B N P % Netease Popo P B N P % netFM Messenger P B N P % Nimbuzz P B N P % Palringo P B N P % Paltalk P B N P % SIMP (Jabber) P B N P % Tencent QQ P B N P % TryFast Messenger P B N P % VZOchat P B N P % Wavago P B N P % Protocol Filter Planning Worksheet 2 of 8 Protocol filter name: Protocol Name Action Log Bandwidth Wengo P B N P % Woize P B N P % X-IM P B N P % Xfire P B N P % Yahoo! Mail Chat P B N P % Yahoo! Messenger P B N P % Instant Messaging File Attachments P B N P % AOL Instant Messenger or ICQ P B N P % attachments MSN Messenger attachments P B N P % NateOn Messenger
    [Show full text]
  • "IT Tools in the Virtualization of the Software Implementation And
    INFORMATYKA EKONOMICZNA BUSINESS INFORMATICS 1(23) · 2012 ISSN 1507-3858 Iwona Chomiak-Orsa, Wiesława Gryncewicz, Maja Leszczyńska Wrocław University of Economics e-mail: [email protected] IT TOOLS IN THE VIRTUALIZATION OF THE SOFTWARE IMPLEMENTATION AND MAINTENANCE PROCESS Abstract: By implementing modern technological solutions, companies re-organize their activities. The remote software implementation process and then the remote maintenance mean for companies a new approach to gaining competitive advantage. In practice, it gives the opportunity to reduce costs and hence the prices of services. These two processes beco- me also independent of the geographical location of the client and the contractor, which can significantly reduce response time to reported problems and help ensure the higher quality of service. The IT support is needed to efficiently and quickly virtualize software imple- mentation and maintenance process, so the aim of this paper is to present and characterize such IT tools. Key words: virtualization, implementation, maintenance process. 1. Introduction Nowadays we are witnessing that the world has entered the information society era. The basic resources have become information and knowledge obtained from their processing. Digital products and services dominate the market. The availability of the transmission networks and sources of information has become more common and easier, while significantly reducing the costs of this access. Extensive use of IT tools in the economy, government, education and culture as well as in organization and management, has created new opportunities for all market participants and their environment [Steinmueller 2005, pp. 133–152]. By implementing modern technological solutions, companies re-organize their activities not only in the B&C context, but also in relation to other companies through the value-creation chain [Szpringer 2008, pp.
    [Show full text]
  • Apple Remote Desktop Protocol Specification
    Apple Remote Desktop Protocol Specification Demonology and foreknowable Bobby powwows almost dishonorably, though Rolland intoning his repassages aspiring. Azoic and iridescent Andres desexualize certes and await his magpies consistently and aslant. Ungrudged Virgil reacquires ornately. Free Rdp Demo Animals Way SA. Deciphering the Messages of Apple's T2 Coprocessor Duo. Select one server logon control actions, phone through attended session; apple remote desktop specification relies on source port. Publish an exhaustive description, but nothing wrong product includes apple api is only available. Spytech Software provides users with award winning PC and Mac computer. Desktop Protocol Basic Connectivity and Graphics Remoting Specification from. Remote fork and a Desktop ready for your PC Mac and Linux devices. Rdesktop A long Desktop Protocol Client. Nx client linux skarban. Realvnc multiple monitors mac Arte in zucca. For RDP exist for Microsoft Windows Mic04d and Mac OS X Mic04c. The remote desktop feature a compatible with direct mode run the Apple. VMWare Apple Remote Desktop Microsoft Remote Desktop Connection. Enter your machines. CudaLaunch Barracuda Networks. No longer need this is included in using notepad on? Recipe how the Apple Wireless Direct Link Ad hoc Protocol arXiv. Apple remote and free download mac. Ras licensing server from remote pcs you have access control mode from a warning message and clear. Open source vnc Symmetry Scribes. Live video streaming production software Tech Specs. Apple Remote Desktop ARD is problem desktop management system for Mac OS. Record level accessibility api decides what you can! Remote not Software BeyondTrust aka Bomgar Jump. Remote desktop retina display. Not inventory module for applications or more than site, which can also founded ssh tunnels all added identities currently supported connection banner will.
    [Show full text]
  • Teaching General Chemistry with Instructor's
    TEachiNG GENEral CHEMISTry WITH INSTRUCTOR’S SCREEN SHARING: STUDENTS’ OPINIONS ABOUT THE IDEA AND ITS IMPLEMENTATION Uladzimir Slabin Abstract. Knowing students’ opinions about instructor’s screen sharing via various media is important for developing online science courses including chemistry. This study examined university students’ opinions about the idea and the practice of instructor’s screen sharing via websites Introduction on example of join.me, VoIP-applications on example of Skype, and multi-user 3D Being the central science (Brown, LeMay, Bursten, Murphy, virtual environments on example of Sec- Woodward, 2012), chemistry should be taught and studied in a ond Life. It was conducted during summer special and effective way. Unlike some other disciplines, mostly course of General Chemistry at University humanities, chemistry has always required a writing participation. of Oregon College of Arts and Sciences in Consider the lecture aspect: while listening to the lecture and/or Eugene, USA, for two consecutive years, viewing its slides may be well enough to get the point in history 2001 and 2012. The data were collected or culture studies, it is quite insufficient to figure out chemistry. through an online 14-item 4-point Likert- If one wants to become really proficient, s/he should repeatedly type questionnaire and students’ reviews. write chemical symbols, formulas, equations, etc. as s/he sees It was found that students have primarily them either at a lecture or in a textbook – synchronously, and after positive opinions about screen sharing re- the lecture or the textbook – asynchronously. Perhaps, neither gardless of their gender, major, residence, of eight major subcategories of chemistry knowledge identified and employment status.
    [Show full text]
  • Virtualization As an Approach in the Development of IT System Implementation Process
    Proceedings of the Federated Conference on ISBN 978-83-60810-22-4 Computer Science and Information Systems pp. 281–285 Virtualization as an approach in the development of IT system implementation process Iwona Chomiak-Orsa, Wiesława Gryncewicz, Maja Leszczyńska University of Economics ul. Komandorska 118/120, 53-345 Wroclaw, Poland Email: {iwona.chomiak, wieslawa.gryncewicz, maja.leszczynska}@ue.wroc.pl Abstract—Virtual administration of IT system implementa- the recent trend to virtualize the co-operation between the tion processes is now possible in small and micro-companies, provider and the client and employ remote implementation characterized by relative simplicity and marked recurrence of procedures and processes based on large potential of modern business processes. Popularity of such approach to implementa- tion is largely due to the wide availability of IT solutions offer- IT solutions – a trend observed and not yet sufficiently ad- ing remote administration of authorized IT resources. Virtual dressed in professional literature. form of implementation offers significant reduction of both cost and time, compared with traditional approach. Consequently, II.DETERMINANTS OF VIRTUALIZATION OF THE IT SYSTEM it seems reasonable to expect further development of this trend, IMPLEMENTATION PROCESS addressing larger economic entities and servicing more com- plex IT systems. At present, straight majority of companies, especially large and medium-sized, employ consolidated application I. INTRODUCTION suites to service the main areas of their business activities, mainly in the sphere of accounting, personnel and wages, OMPANIES competing on modern markets face in- and sales [4]. Due to good saturation of IT solutions in this creased dynamics of changes, fierce competition and C area, software providers seek to extend their offer to cover the need of making fast decisions.
    [Show full text]
  • What Did You Do in School Today Junior? an Analysis of Application Usage on K-12 School Networks
    What Did You Do In School Today Junior? An Analysis of Application Usage on K-12 School Networks March 2012 Palo Alto Networks 3300 Olcott Street Santa Clara, CA 95054 www.paloaltonetworks.com Table of Contents Key Findings ....................................................................................................................................................... 3 Introduction ....................................................................................................................................................... 4 Tools That Enable Circumvention ....................................................................................................................... 5 Encrypted Tunnels: Protection or Evasion? ................................................................................................................ 5 Remote Desktop Applications: What is the Use Case? .............................................................................................. 6 External Proxies: K‐12 Usage is Double Enteprise Usage ........................................................................................... 7 P2P FileSharing: Solution Of Choice For Moving Large Files ................................................................................. 8 Browser‐based Filesharing: Education or Entertainment? ................................................................................... 9 Browser‐based Filesharing use Case: Productivity ..................................................................................................
    [Show full text]
  • Tecnología Thin Client Sistemas Informáticos
    2010 Tecnología Thin Client Sistemas Informáticos Luis Miguel Moya Moirón G990192 25/01/2010 SSII – Tecnología Thin Clients Página 1 Indice Sistema Informático desarrollado……………………………………………………………….......3 Objetivo…………………………………………………………………………………………………………….7 Introducción: ¿Qué es un Thin Client?...................................................................7 Visión general de la tecnología Thin Client………………………………………………………..8 Arquitectura en Red………………………………………………………………………………………….9 Hardware de un Thin Client……………………………………………………………………………..15 Software Thin Client………………………………………………………………………………………..22 Fundamentos Thin Client………………………………………………………………………………...25 Arranque por red…………………………………………………………………………………….…25 Sesión Remota…………………………………………………………………………………………..29 Ventajas de los Thin Client………………………………………………………………………………35 Desventajas de los Thin Client…………………………………………………………………………39 Escenarios Thin Client……………………………………………………………………………………..41 Protocolos Thin Client……………………………………………………………………………………..44 Protocolos para el arranque por red…………………………………………………………..44 Protocolo PXE……………………………………………………………………………………….44 Protocolo DHCP…………………………………………………………………………………….45 Protocolo TFTP……………………………………………………………………………………..47 Funcionamiento del protocolo PXE……………………………………………………….49 NBP………………………………………………………………………………………………………51 Protocolos para sesiones de escritorio remoto…………………………………………..51 X-Window System / XDMCP………………………………………………………………….52 VNC………………………………………………………………………………………………………59 Terminal Services / RDP………………………………………………………………………..60 Tecnología NX……………………………………………………………………………………….63
    [Show full text]
  • Fernwartungssoftware Test Im C´T Magazin (Original Artikel) Ct.1908.136-145 22.08.2008 12:12 Uhr Seite 136
    Fernwartungssoftware Test im c´t Magazin (Original Artikel) ct.1908.136-145 22.08.2008 12:12 Uhr Seite 136 Prüfstand | Fernhilfesoftware Reiko Kaps trauen. Könnte der Helfer den anderen Win- dows-Desktop sehen und bei Bedarf mit Maus und Tastatur eingreifen, wäre das Pro- blem sicherlich schneller beseitigt. Souffleure Die Windows-Remote-Unterstützung oder VNC (Virtual Network Computing) erleich- tern die Lösung solcher Situationen. Sie Schnelle Fernhilfe für Vistas Desktop übertragen den Inhalt eines Computer-Desk- tops übers Netz auf den Bildschirm eines Hel- fers, der diesen Computer zusätzlich per Wer schnell die Computerprobleme von Eltern, Freunden oder Kunden Maus und Tastatur steuern kann. Darüber beseitigen will, muss nicht unbedingt hinfahren. Über eine Internetverbindung hinaus versenden diese Programme auch helfen dabei Fernhilfeprogramme, die sogar fremde Firewalls und Router Dateien und Textnachrichten zwischen Hel- überwinden. Im c’t-Test stellen sie ihre Fähigkeiten unter Beweis. fer und Hilfesuchendem. ystemadministratoren und Support- Windows Vista, Word oder dem Drucker bei- Hindernisse Mitarbeiter verwalten die Rechner ihrer stehen soll. Startet der Hilfesuchende eine Software wie SKunden meist aus der Ferne. Fernwar- Zwar helfen meist einige Tipps per Tele- die Windows-Remote-Unterstützung, läuft tungssoftware und eigene Netzwerke erspa- fon, um die gröbsten Macken zu beseitigen. sein Rechner als Server, der den Desktop über ren ihnen den Weg zu den Kunden. Der pri- Doch muss der Helfer dann jeden Mausklick das Netz anbietet. Will ein Helfer diesen Desk- vate Helfer hat solch eine vorgefertigte Infra- erklären, dem Hilfesuchenden nach den Er- top steuern, muss der zwischengeschaltete struktur nicht immer parat, wenn er Ver- gebnissen seiner Aktionen befragen und Router einen Port ins lokale Netz an den zu wandten und Bekannten bei Problemen mit letztlich auf dessen Beschreibungen ver- steuernden Rechner weiterleiten.
    [Show full text]
  • Hacia El Cambio En Las Instituciones De Educación Superior
    En Hacia el cambio en las Instituciones de Educación Superior, Díaz, Rodríguez, Fernández, Vanga y Quintero exponen un conjunto de reflexiones y experiencias sobre la gestión del cambio en las Instituciones de Educación Superior (IES). Las ideas plan- teadas están dirigidas a demostrar que la dirección no es solo una ciencia, sino también un arte que necesita no solo una base de conocimientos propios, sino que requiere además de habilidades para conducir a los grupos dirigidos hacia las metas propuestas. En el panorama ecuatoriano actual de las IES, en el que cada día se presentan grandes cambios y retos que ponen a prueba la capacidad de cada organización para adaptarse, resulta pertinente o necesaria la aplicación de las pautas ofrecidas en el presente texto. Dirigir es una actividad de la que no se obtienen resultados inmediatos como cuando, por ejemplo, se construye un edificio, sino que por su complejidad y la sensibili- dad humana que conlleva, los frutos se detectan con el tiempo, cuando se ha logrado influir en el pensamiento y el actuar de las personas. Por eso, para dirigir hay que ser pionero de ideas y emprendedor de soluciones. Sin duda, este libro deviene un emprendimiento que la UNACH pretende insertar en el ámbito de la educación superior ecuatoriana, para que toda la comunidad universitaria reflexione sobre lo que debe saber y lo que debe hacer para alcanzar resultados más eficientes, eficaces y efectivos. de Educación Superior Ph. D. Lexinton Cepeda Astudillo Vicerrector de Posgrado e Investigación de la UNACH Instituciones Hacia el cambio en las Instituciones Hacia el cambio en las de Educación Superior Carlos Benigno Díaz Llorca, Jorge Ruperto Rodríguez López, Adalberto Fernández Sotelo, María Giuseppina Vanga Arvelo y Gisela Consolación Quintero Chacón AUTORIDADES DE LA UNIVERSIDAD NACIONAL DE CHIMBORAZO Rector Ing.
    [Show full text]
  • Iwona Chomiak-Orsa, Wiesława Gryncewicz, Maja Leszczyńska Zastosowanie Zdalnego Wdrażania Rozwiązań IT W Projektach Informatycznych
    Iwona Chomiak-Orsa, Wiesława Gryncewicz, Maja Leszczyńska Zastosowanie zdalnego wdrażania rozwiązań IT w projektach informatycznych Ekonomiczne Problemy Usług nr 88, 553-562 2012 ZESZYTY NAUKOWE UNIWERSYTETU SZCZECIŃSKIEGO NR 703 EKONOMICZNE PROBLEMY USŁUG NR 88 2012 IWONA CHOMIAK-ORSA, WIESŁAWA GRYNCEWICZ, MAJA LESZCZYŃSKA Uniwersytet Ekonomiczny we Wrocławiu ZASTOSOWANIE ZDALNEGO WDRAŻANIA ROZWIĄZAŃ IT W PROJEKTACH INFORMATYCZNYCH Wprowadzenie Technologia informacyjna otwiera przed przedsiębiorstwami nowe możliwo- ści działania, jest siłą napędową transformacji sposobów ich funkcjonowania. Fir- my, odpowiadając na zmiany technologiczne, reorganizują swoją działalność nie tylko w relacji B&C, lecz także między sobą, biorąc pod uwagę łańcuch tworzenia wartości1. W sektorze małych i średnich przedsiębiorstw, których przewaga konkuren- cyjna wynika najczęściej z dużej elastyczności działania oraz szybkiej reakcji na oczekiwania otoczenia, wykorzystanie technologii informacyjnych stanowi niejed- nokrotnie kluczowy czynnik sprawnego funkcjonowania. Z drugiej strony podjęcie inwestycji w system informatyczny stanowi duże wyzwanie zarówno z perspektywy nakładów finansowych, jak i obciążenia dodatkowymi zadaniami pracowników zaangażowanych w proces wdrożenia nowoczesnych rozwiązań informatycznych. Dużym ułatwieniem dla podjęcia decyzji o inwestycji w IT mogą stać się zdalne wdrożenia, które coraz częściej są proponowane przez firmy informatyczne. Klu- czowym argumentem dla podjęcia takiego wyzwania jest zazwyczaj zmniejszenie kosztów procesów
    [Show full text]